what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-04-10

hns.pl
Posted Apr 10, 2000
Authored by MerXorcist

hns.pl grabs current news only from www.net-security.org.

tags | web
SHA-256 | 145d7c7865b2bcf83ec22266a65aaea6635ac330454bd1e793f9f8434f2a6709
sara-2.1.13.tar.gz
Posted Apr 10, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Added daemon mode of SARA, Improved SMB analysis (fewer false positives), Added basic Shaft DDoS detection, Improved http.sara, fixed IRIX makefile problem, Added test for IRIX 5.x - 6.2 objectserver exploit.
tags | tool, cgi, scanner
systems | unix
SHA-256 | a518302aedb9fba4a040f690ec5857c4f04fd565819329c928fc297f5e21b89e
Nmap Scanning Utility 2.30 BETA 19
Posted Apr 10, 2000
Authored by Fyodor | Site insecure.org

Nmap is an advanced utility for network exploration or security auditing. It supports ping scanning, many port scanning techniques, TCP/IP fingerprinting (remote OS detection), advanced host enumeration, firewall bypassing, flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Tweaked the output so that it now tells how many ports are not shown and what state the ignored ports are in, Added a new attribute "Ignored State: xxx" to the machine parseable logs, openbsd and linux fixes, and minor bug fixes.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 81b964ec3afd970885a257e54d74775e338c2000a401610d1204360f9e98709b
cattscanner-0.61.tar.gz
Posted Apr 10, 2000

No information is available for this file.

tags | tool, scanner
systems | unix
SHA-256 | 42b7ad06bfae7780a9a123979eb073203e428629dd16db19cc5c922b626d59ab
IRIX.Login.Security.txt
Posted Apr 10, 2000
Authored by Prizm

IRIX Login Security - In this paper you will learn a bit about logins, and the seriousness of what could happen if you don't take certain precautions. You will have found out some options you can take with your logins, certain restrictions, and a lot more.

tags | paper
systems | unix, irix
SHA-256 | 35daa4e31eadc2e9835852cb680f16c18c3d63d83c32a3c93afa078dcdfd4718
hnn.pl
Posted Apr 10, 2000
Authored by MerXorcist

hnn.pl grabs current or archived news from hackernews.com.

tags | web
SHA-256 | 4aa74e156b28e47e67ebd2f0773cbd2892e57ab0845795c9fce896c00ee121b6
NTsec.doc
Posted Apr 10, 2000
Authored by Neon-Lenz | Site ellicit.org

NTsec.doc is a Microsoft Word document concerning Remote NT-security, contains information about SMB, NetBIOS, NT-TCP/IP, and major IIS vulnerabilities. The current version is 1.0, updates are coming very soon.

tags | paper, remote, tcp, vulnerability
SHA-256 | 2a9088874be5b5f5b4ad405f727eb289264350261f9fe88962bf3ba4d59ea695
freenet-0.1beta.tgz
Posted Apr 10, 2000
Authored by The Freenet Development Team | Site freenet.sourceforge.net

Freenet is a peer-to-peer network designed to allow the distribution of information over the Internet in an efficient manner, without fear of censorship. It is completely decentralized (there is no person or computer essential to its operation), meaning that Freenet cannot be attacked like centralized peer-to-peer systems such as Napster. Freenet also employs intelligent routing and caching to learn to route requests more efficiently, automatically mirror popular data, make network flooding almost impossible, and move data to where it is in greatest demand.

tags | tool
systems | unix
SHA-256 | 8c90b7a1ca29f9982d4550a9106c7c19a6acd7cbe0dac4a0b44ed9d04087e11c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close